Abstract is missing.
- Analyzing First-Order Role Based Access ControlCarlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel. 3-17 [doi]
- Decomposing, Comparing, and Synthesizing Access Control Expressiveness SimulationsWilliam C. Garrison III, Adam J. Lee. 18-32 [doi]
- Compositional Typed Analysis of ARBAC PoliciesStefano Calzavara, Alvise Rabitti, Michele Bugliesi. 33-45 [doi]
- Policy Privacy in Cryptographic Access ControlAnna Lisa Ferrara, Georg Fuchsbauer, Bin Liu, Bogdan Warinschi. 46-60 [doi]
- Location Privacy via Differential Private Perturbation of Cloaking AreaHoa Ngo, Jong Kim. 63-74 [doi]
- Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active AdversariesMartin Pettai, Peeter Laud. 75-89 [doi]
- A Game-Theoretic Study on Non-monetary Incentives in Data Analytics Projects with Privacy ImplicationsMichela Chessa, Jens Grossklags, Patrick Loiseau. 90-104 [doi]
- A Cut Principle for Information FlowJoshua D. Guttman, Paul D. Rowe. 107-121 [doi]
- The Anatomy and Facets of Dynamic PoliciesNiklas Broberg, Bart van Delft, David Sands. 122-136 [doi]
- Hybrid Monitors for Concurrent NoninterferenceAslan Askarov, Stephen Chong, Heiko Mantel. 137-151 [doi]
- Du-Vote: Remote Electronic Voting with Untrusted ComputersGurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson. 155-169 [doi]
- Decidability of Trace Equivalence for Protocols with NoncesRémy Chrétien, Véronique Cortier, Stéphanie Delaune. 170-184 [doi]
- Set-Pi: Set Membership p-CalculusAlessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson. 185-198 [doi]
- A Complete Characterization of Secure Human-Server CommunicationDavid A. Basin, Sasa Radomirovic, Michael Schläpfer. 199-213 [doi]
- A Definitional Framework for Functional EncryptionChristian Matt 0002, Ueli Maurer. 217-231 [doi]
- Reasoning about Policy Behavior in Logic-Based Trust Management Systems: Some Complexity Results and an Operational FrameworkEdelmira Pasarella, Jorge Lobo. 232-242 [doi]
- Picking vs. Guessing Secrets: A Game-Theoretic AnalysisM. H. R. Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa. 243-257 [doi]
- Program Actions as Actual Causes: A Building Block for AccountabilityAnupam Datta, Deepak Garg 0001, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha. 261-275 [doi]
- BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal ManipulationsMordechai Guri, Matan Monitz, Yisroel Mirski, Yuval Elovici. 276-289 [doi]
- A Parametric Family of Attack Models for Proxy Re-encryptionDavid Nuñez, Isaac Agudo, Javier Lopez. 290-301 [doi]
- A Hybrid Approach for Proving Noninterference of Java ProgramsRalf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr. 305-319 [doi]
- Android Permissions UnleashedAlessandro Armando, Roberto Carbone, Gabriele Costa, Alessio Merlo. 320-333 [doi]
- Cryptographic Enforcement of Language-Based Information ErasureAslan Askarov, Scott Moore, Christos Dimoulas, Stephen Chong. 334-348 [doi]
- Value-Sensitive Hybrid Information Flow Control for a JavaScript-Like LanguageDaniel Hedin, Luciano Bello, Andrei Sabelfeld. 351-365 [doi]
- Information Flow Control for Event Handling and the DOM in Web BrowsersVineet Rajani, Abhishek Bichhawat, Deepak Garg 0001, Christian Hammer 0001. 366-379 [doi]
- An Analysis of Universal Information Flow Based on Self-CompositionChristian Muller, Máté Kovács, Helmut Seidl. 380-393 [doi]
- On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled MiningLoi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor. 397-411 [doi]
- Symbolic Malleable Zero-Knowledge ProofsMichael Backes 0001, Fabian Bendun, Matteo Maffei, Esfandiar Mohammadi, Kim Pecina. 412-426 [doi]
- A Mechanized Proof of Security for Searchable Symmetric EncryptionAdam Petcher, Greg Morrisett. 481-494 [doi]
- Probabilistic Program Modeling for High-Precision Anomaly ClassificationKui Xu, Danfeng (Daphne) Yao, Barbara G. Ryder, Ke Tian. 497-511 [doi]
- A Logic of Programs with Interface-Confined CodeLimin Jia, Shayak Sen, Deepak Garg 0001, Anupam Datta. 512-525 [doi]
- Rational Protection against Timing AttacksGoran Doychev, Boris Köpf. 526-536 [doi]
- Understanding and Enforcing OpacityDaniel Schoepe, Andrei Sabelfeld. 539-553 [doi]
- A Methodology for Information Flow ExperimentsMichael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing. 554-568 [doi]
- Flow-Limited AuthorizationOwen Arden, Jed Liu, Andrew C. Myers. 569-583 [doi]